Cyber weapons versus physical weapons - which one will win? The cyber weapons will be able to sabotage an specific environment to do exactly what the cyber weapon is build for. This is the same for autonomous cyber weapons that are being used. But then you will have to think about the following;
How will an cyber commander be able to change the agenda of an autonomous cyber weapon once there has been a change in strategies?
All warfare is based on deception that is what Sun Tzu said in his book Art of War. Sun Tzu was an ancient Chinese military general, strategist and philosopher who is traditionally believed to be the author of the well known book "The Art of War", an influential ancient Chinese book on military strategy.
As Sun Tzu died at 496 BC his tactics are still conform the present day. Cyberwarzone will show you some of his tactics that are used in the area of cyber warfare.
The US has brought criminal charges against 13 persons, said to be members of the hacktivist collective Anonymous, for their alleged participation in cyberattacks as part of a campaign called Operation Payback.
The defendants and other members of Anonymous allegedly launched or attempted to launch cyberattacks against government entities, trade associations, individuals, law firms and financial institutions, according to a federal grand jury indictment released Thursday in the US District Court for the Eastern District of Virginia, Alexandria division.
The importance of energy security and energy infrastructure security cannot be overstated. It is among the most serious security, economic and environmental challenges of both today, and the future. In recent years, protecting critical energy infrastructure from terrorists has received increasing attention from the international community. Since critical energy infrastructure contains the fuel that keeps the global economy moving and our societies working, our dependency on such infrastructure makes it an ideal target for terrorists.
Cyberwarfare is being considered by the U.S. as it mulls whether to intervene in the Syran civil war. Electronic methods to disable enemy air defense systems include the injection of malware into the air-defense network via computer attack or by electronic warfare aircraft capable of jamming radar. Cyberattacks can cause permanent damage.
The Pentagon has cyberattack capabilities that allow the U.S. military to help blind Syrian air defenses without firing a shot, according to military analysts.
The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people.
Israel established 11 new diplomatic missions worldwide between 2010 and 2012, the country’s Finance Ministry reported. Among them is a diplomatic mission in the Persian Gulf, but officials refuse to disclose its location.
The Finance Ministry’s budget for the next year, to be submitted for Cabinet approval this week, has revealed that Israel has created almost a dozen new missions around the world since 2010.